/external/dropbear/libtomcrypt/src/pk/asn1/der/boolean/ |
der_length_boolean.c | 22 @return CRYPT_OK if successful 28 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ltc_ecc_map.c | 31 @return CRYPT_OK on success 42 if ((err = mp_init_multi(&t1, &t2, NULL)) != CRYPT_OK) { 47 if ((err = mp_montgomery_reduce(P->z, modulus, mp)) != CRYPT_OK) { goto done; } 50 if ((err = mp_invmod(P->z, modulus, t1)) != CRYPT_OK) { goto done; } 53 if ((err = mp_sqr(t1, t2)) != CRYPT_OK) { goto done; } 54 if ((err = mp_mod(t2, modulus, t2)) != CRYPT_OK) { goto done; } 55 if ((err = mp_mul(t1, t2, t1)) != CRYPT_OK) { goto done; } 56 if ((err = mp_mod(t1, modulus, t1)) != CRYPT_OK) { goto done; } 59 if ((err = mp_mul(P->x, t2, P->x)) != CRYPT_OK) { goto done; } 60 if ((err = mp_montgomery_reduce(P->x, modulus, mp)) != CRYPT_OK) { goto done; [all...] |
ltc_ecc_projective_add_point.c | 33 @return CRYPT_OK on success 46 if ((err = mp_init_multi(&t1, &t2, &x, &y, &z, NULL)) != CRYPT_OK) { 51 if ((err = mp_sub(modulus, Q->y, t1)) != CRYPT_OK) { goto done; } 60 if ((err = mp_copy(P->x, x)) != CRYPT_OK) { goto done; } 61 if ((err = mp_copy(P->y, y)) != CRYPT_OK) { goto done; } 62 if ((err = mp_copy(P->z, z)) != CRYPT_OK) { goto done; } 67 if ((err = mp_sqr(Q->z, t1)) != CRYPT_OK) { goto done; } 68 if ((err = mp_montgomery_reduce(t1, modulus, mp)) != CRYPT_OK) { goto done; } 70 if ((err = mp_mul(t1, x, x)) != CRYPT_OK) { goto done; } 71 if ((err = mp_montgomery_reduce(x, modulus, mp)) != CRYPT_OK) { goto done; [all...] |
ltc_ecc_projective_dbl_point.c | 32 @return CRYPT_OK on success 44 if ((err = mp_init_multi(&t1, &t2, NULL)) != CRYPT_OK) { 49 if ((err = mp_copy(P->x, R->x)) != CRYPT_OK) { goto done; } 50 if ((err = mp_copy(P->y, R->y)) != CRYPT_OK) { goto done; } 51 if ((err = mp_copy(P->z, R->z)) != CRYPT_OK) { goto done; } 55 if ((err = mp_sqr(R->z, t1)) != CRYPT_OK) { goto done; } 56 if ((err = mp_montgomery_reduce(t1, modulus, mp)) != CRYPT_OK) { goto done; } 58 if ((err = mp_mul(R->z, R->y, R->z)) != CRYPT_OK) { goto done; } 59 if ((err = mp_montgomery_reduce(R->z, modulus, mp)) != CRYPT_OK) { goto done; } 61 if ((err = mp_add(R->z, R->z, R->z)) != CRYPT_OK) { goto done; [all...] |
ecc_import.c | 31 if ((err = mp_init_multi(&prime, &b, &t1, &t2, NULL)) != CRYPT_OK) { 36 if ((err = mp_read_radix(prime, key->dp->prime, 16)) != CRYPT_OK) { goto error; } 37 if ((err = mp_read_radix(b, key->dp->B, 16)) != CRYPT_OK) { goto error; } 40 if ((err = mp_sqr(key->pubkey.y, t1)) != CRYPT_OK) { goto error; } 43 if ((err = mp_sqr(key->pubkey.x, t2)) != CRYPT_OK) { goto error; } 44 if ((err = mp_mod(t2, prime, t2)) != CRYPT_OK) { goto error; } 45 if ((err = mp_mul(key->pubkey.x, t2, t2)) != CRYPT_OK) { goto error; } 48 if ((err = mp_sub(t1, t2, t1)) != CRYPT_OK) { goto error; } 51 if ((err = mp_add(t1, key->pubkey.x, t1)) != CRYPT_OK) { goto error; } 52 if ((err = mp_add(t1, key->pubkey.x, t1)) != CRYPT_OK) { goto error; [all...] |
ecc_verify_hash.c | 44 @return CRYPT_OK if successful (even if the signature is not valid) 70 if ((err = mp_init_multi(&r, &s, &v, &w, &u1, &u2, &p, &e, &m, NULL)) != CRYPT_OK) { 86 LTC_ASN1_EOL, 0UL, NULL)) != CRYPT_OK) { 91 if ((err = mp_read_radix(p, (char *)key->dp->order, 16)) != CRYPT_OK) { goto error; } 94 if ((err = mp_read_radix(m, (char *)key->dp->prime, 16)) != CRYPT_OK) { goto error; } 103 if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, (int)hashlen)) != CRYPT_OK) { goto error; } 106 if ((err = mp_invmod(s, p, w)) != CRYPT_OK) { goto error; } 109 if ((err = mp_mulmod(e, w, p, u1)) != CRYPT_OK) { goto error; } 112 if ((err = mp_mulmod(r, w, p, u2)) != CRYPT_OK) { goto error; } 115 if ((err = mp_read_radix(mG->x, (char *)key->dp->Gx, 16)) != CRYPT_OK) { goto error; [all...] |
ecc_sign_hash.c | 35 @return CRYPT_OK if successful 60 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 66 if ((err = mp_init_multi(&r, &s, &p, &e, NULL)) != CRYPT_OK) { 69 if ((err = mp_read_radix(p, (char *)key->dp->order, 16)) != CRYPT_OK) { goto errnokey; } 70 if ((err = mp_read_unsigned_bin(e, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto errnokey; } 74 if ((err = ecc_make_key_ex(prng, wprng, &pubkey, key->dp)) != CRYPT_OK) { 79 if ((err = mp_mod(pubkey.pubkey.x, p, r)) != CRYPT_OK) { goto error; } 85 if ((err = mp_invmod(pubkey.k, p, pubkey.k)) != CRYPT_OK) { goto error; } /* k = 1/k */ 86 if ((err = mp_mulmod(key->k, r, p, s)) != CRYPT_OK) { goto error; } /* s = xr */ 87 if ((err = mp_add(e, s, s)) != CRYPT_OK) { goto error; } /* s = e + xr * [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_verify_key.c | 24 @return CRYPT_OK if successful 38 if ((err = mp_prime_is_prime(key->q, 8, &res)) != CRYPT_OK) { 42 return CRYPT_OK; 45 if ((err = mp_prime_is_prime(key->p, 8, &res)) != CRYPT_OK) { 49 return CRYPT_OK; 54 return CRYPT_OK; 56 if ((err = mp_init_multi(&tmp, &tmp2, NULL)) != CRYPT_OK) { return err; } 57 if ((err = mp_sub_d(key->p, 1, tmp)) != CRYPT_OK) { goto error; } 59 err = CRYPT_OK; 65 err = CRYPT_OK; [all...] |
/external/dropbear/libtomcrypt/src/pk/asn1/der/choice/ |
der_decode_choice.c | 26 @return CRYPT_OK on success 55 if (der_decode_integer(in, *inlen, data) == CRYPT_OK) { 56 if (der_length_integer(data, &z) == CRYPT_OK) { 59 return CRYPT_OK; 65 if (der_decode_short_integer(in, *inlen, data) == CRYPT_OK) { 66 if (der_length_short_integer(size, &z) == CRYPT_OK) { 69 return CRYPT_OK; 75 if (der_decode_bit_string(in, *inlen, data, &size) == CRYPT_OK) { 76 if (der_length_bit_string(size, &z) == CRYPT_OK) { 80 return CRYPT_OK; [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
rng_make_prng.c | 24 @return CRYPT_OK if successful 35 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 43 if ((err = prng_descriptor[wprng].start(prng)) != CRYPT_OK) { 52 if ((err = prng_descriptor[wprng].add_entropy(buf, (unsigned long)bits, prng)) != CRYPT_OK) { 56 if ((err = prng_descriptor[wprng].ready(prng)) != CRYPT_OK) { 63 return CRYPT_OK;
|
sprng.c | 41 @return CRYPT_OK if successful 45 return CRYPT_OK; 53 @return CRYPT_OK if successful 57 return CRYPT_OK; 63 @return CRYPT_OK if successful 67 return CRYPT_OK; 86 @return CRYPT_OK if successful 90 return CRYPT_OK; 98 @return CRYPT_OK if successful 105 return CRYPT_OK; [all...] |
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_make_key.c | 26 @return CRYPT_OK if successful, upon error all allocated ram is freed 40 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 44 if ((err = mp_init_multi(&p, &q, &tmp1, &tmp2, NULL)) != CRYPT_OK) { 52 if ((err = rand_prime(q, -size, prng, wprng)) != CRYPT_OK) { goto done; } 53 if ((err = mp_sub_d(q, 1, tmp1)) != CRYPT_OK) { goto done; } 57 if ((err = rand_prime(p, size+1, prng, wprng)) != CRYPT_OK) { goto done; } 58 if ((err = mp_gcd(p, tmp1, tmp2)) != CRYPT_OK) { goto done; } 63 &key->qP, &key->p, &key->q, &key->pq, NULL)) != CRYPT_OK) { 68 if ((err = mp_copy( p, key->p)) != CRYPT_OK) { goto error2; } 69 if ((err = mp_copy( q, key->q)) != CRYPT_OK) { goto error2; [all...] |
/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_fsa.c | 32 if ((err = register_cipher(p)) != CRYPT_OK) { 39 if ((err = register_hash(p)) != CRYPT_OK) { 46 if ((err = register_prng(p)) != CRYPT_OK) { 53 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_make_key.c | 27 @return CRYPT_OK if successful, upon error all allocated ram is freed 45 if ((err = prng_is_valid(wprng)) != CRYPT_OK) { 49 if ((err = mp_init_multi(&p, &q, &tmp1, &tmp2, &tmp3, NULL)) != CRYPT_OK) { 54 if ((err = mp_set_int(tmp3, e)) != CRYPT_OK) { goto errkey; } /* tmp3 = e */ 58 if ((err = rand_prime( p, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } 59 if ((err = mp_sub_d( p, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = p-1 */ 60 if ((err = mp_gcd( tmp1, tmp3, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = gcd(p-1, e) */ 65 if ((err = rand_prime( q, size/2, prng, wprng)) != CRYPT_OK) { goto errkey; } 66 if ((err = mp_sub_d( q, 1, tmp1)) != CRYPT_OK) { goto errkey; } /* tmp1 = q-1 */ 67 if ((err = mp_gcd( tmp1, tmp3, tmp2)) != CRYPT_OK) { goto errkey; } /* tmp2 = gcd(q-1, e) * [all...] |
rsa_exptmod.c | 28 @return CRYPT_OK if successful 54 if ((err = mp_init_multi(&tmp, &tmpa, &tmpb, NULL)) != CRYPT_OK) { return err; } 55 if ((err = mp_read_unsigned_bin(tmp, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto error; } 66 if ((err = mp_exptmod(tmp, key->dP, key->p, tmpa)) != CRYPT_OK) { goto error; } 69 if ((err = mp_exptmod(tmp, key->dQ, key->q, tmpb)) != CRYPT_OK) { goto error; } 72 if ((err = mp_sub(tmpa, tmpb, tmp)) != CRYPT_OK) { goto error; } 73 if ((err = mp_mulmod(tmp, key->qP, key->p, tmp)) != CRYPT_OK) { goto error; } 76 if ((err = mp_mul(tmp, key->q, tmp)) != CRYPT_OK) { goto error; } 77 if ((err = mp_add(tmp, tmpb, tmp)) != CRYPT_OK) { goto error; } 80 if ((err = mp_exptmod(tmp, key->e, key->N, tmp)) != CRYPT_OK) { goto error; [all...] |
/external/dropbear/libtomcrypt/src/modes/cbc/ |
cbc_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(cbc->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(cfb->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/ecb/ |
ecb_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(ecb->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(f8->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/lrw/ |
lrw_done.c | 23 @return CRYPT_OK if successful 31 if ((err = cipher_is_valid(lrw->cipher)) != CRYPT_OK) { 36 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_done.c | 22 @return CRYPT_OK on success 29 if ((err = cipher_is_valid(ofb->cipher)) != CRYPT_OK) { 33 return CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_file.c | 28 @return CRYPT_OK if successful, CRYPT_NOP if file support has been disabled 48 if((err = hash_is_valid(hash)) != CRYPT_OK) { 52 if ((err = hmac_init(&hmac, hash, key, keylen)) != CRYPT_OK) { 64 if ((err = hmac_process(&hmac, buf, (unsigned long)x)) != CRYPT_OK) { 76 if ((err = hmac_done(&hmac, out, outlen)) != CRYPT_OK) { 84 return CRYPT_OK;
|
hmac_memory.c | 29 @return CRYPT_OK if successful 45 if ((err = hash_is_valid(hash)) != CRYPT_OK) { 61 if ((err = hmac_init(hmac, hash, key, keylen)) != CRYPT_OK) { 65 if ((err = hmac_process(hmac, in, inlen)) != CRYPT_OK) { 69 if ((err = hmac_done(hmac, out, outlen)) != CRYPT_OK) { 73 err = CRYPT_OK;
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 29 @return CRYPT_OK if successful 45 if ((err = cipher_is_valid(cipher)) != CRYPT_OK) { 61 if ((err = omac_init(omac, cipher, key, keylen)) != CRYPT_OK) { 64 if ((err = omac_process(omac, in, inlen)) != CRYPT_OK) { 67 if ((err = omac_done(omac, out, outlen)) != CRYPT_OK) { 71 err = CRYPT_OK;
|